{"id":8857,"date":"2020-05-23T04:03:32","date_gmt":"2020-05-23T01:03:32","guid":{"rendered":"https:\/\/forklog.media\/?p=8857"},"modified":"2020-05-23T02:44:05","modified_gmt":"2020-05-22T23:44:05","slug":"quantum-computers-pose-threat-to-email-safety-but-solution-is-on-the-way","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/quantum-computers-pose-threat-to-email-safety-but-solution-is-on-the-way\/","title":{"rendered":"Quantum Computers Pose Threat to Email Safety, But Solution Is on the Way"},"content":{"rendered":"<p>With the potential to perform more advanced calculations and create more complex processing networks, quantum computers also pose new risks of compromising the most sophisticated cybersecurity systems.<\/p>\n<p><!--more--><\/p>\n<p>To address this issue, the team behind end-to-end encrypted email software Tutanota and the Leibniz University of Hannover have <a href=\"https:\/\/www.tutanota.com\/blog\/posts\/pqmail-launch-post-quantum-cryptography\/\">jointly begun<\/a> a dedicated research project. The parties claim to develop a quantum computer resistant cryptography to protect Tutanota email application users against potential decryption of all currently encrypted emails. Tutanota explained to forklog.media:<\/p>\n<blockquote><p><strong><i>\u201cQuantum computers do [&#8230;] pose a serious threat to cryptography as the asymmetric cryptosystems that are widely used today (RSA, (EC)DSA and (EC)DH), rely on variants of only two hard mathematical problems that, unfortunately, quantum computers are able to solve significantly faster: the integer factorization problem and the discrete logarithm problem.\u201d<\/i><\/strong><\/p><\/blockquote>\n<h2>Make It Before It\u2019s Too Late<\/h2>\n<p>The researchers suggest it will take 10 to 15 years for quantum computers to become capable of performing attacks on users\u2019 computer systems. If so, bad actors will be able to get access to confidential communication of mainstream users and conduct corporate espionage and malicious attacks as, per Tutanota, there are very few apps that use quantum-safe encryption and there is no implementation for emails yet.<\/p>\n<blockquote><p><strong><em>\u201cThe particular challenge of the project is that the encryption algorithms must be secure but also perform well. Encryption must be performant in the browser, in desktop clients as well as on mobile devices via Android and iOS App, so that even older devices with low memory and computing power can perform the encryption and decryption,\u201d the company noted in the blog post.<\/em><\/strong><\/p><\/blockquote>\n<p>Tutanota told forklog.media that it does not expect major email service providers to introduce quantum-safe encryption, further adding:<\/p>\n<blockquote><p><strong><i>\u201cGoogle once launched a project to add end-to-end encryption to Gmail, but discontinued it in 2017. There is no interest from big corporations to encrypt users&#8217; data because it would destroy their business model of creating user profiles and posting targeted advertisements.\u201d<\/i><\/strong><\/p><\/blockquote>\n<h2>Dramatic Changes Brought by Quantum Computers<\/h2>\n<p>Tutanota went on saying that quantum computers will increase the computation power to an extent we are not really capable of imagining yet. This will ostensibly bring dramatic changes, particularly in fields like Big Data and Artificial Intelligence.<\/p>\n<p>This issue apparently raises serious concerns as developers and scientists around the world have become involved in the development of quantum-resistant solutions. Thus, physicists at the Russian Quantum Center (RQC) created and tested what they call the <a href=\"https:\/\/forklog.com\/en\/russian-physicists-develop-the-worlds-first-quantum-safe-blockchain\/\">world\u2019s first quantum blockchain<\/a>, an unhackable system for distributed data storage.<\/p>\n<p>According to Alexei Fyodorov of the RQC, unlimited computational capacity of quantum computers theoretically may empower attackers to counterfeit electronic signatures in blockchain transactions, and thus alter it or interfere with other users\u2019 interaction.<\/p>\n<p>In 2019, Jesse Lund, vice president of blockchain and digital currencies at IBM, also <a href=\"https:\/\/forklog.com\/en\/the-threat-of-quantum-computers-will-bitcoin-get-hacked\/\">warned about the likelihood of a quantum computer-related threat<\/a> to both cryptocurrencies and the cryptography methods involved.<\/p>\n<p><i>Written by Ana Alexandre<\/i><\/p>\n<p><b>Follow us on\u00a0<\/b><a href=\"https:\/\/twitter.com\/forklogmedia\"><b>Twitter<\/b><\/a><b>\u00a0and\u00a0<\/b><a href=\"https:\/\/www.facebook.com\/forklogmedia\"><b>Facebook<\/b><\/a><b>\u00a0and join our\u00a0<\/b><a href=\"https:\/\/t.me\/forklogmedia\"><b>Telegram channel<\/b><\/a><b>\u00a0to know what\u2019s up with crypto and why it\u2019s important.<\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the potential to perform more advanced calculations and create more complex processing networks, quantum computers also pose new risks of compromising the most sophisticated cybersecurity systems.<\/p>\n","protected":false},"author":6,"featured_media":8859,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"human_written","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[43,575,148],"class_list":["post-8857","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-hackers","tag-quantum-computers","tag-security"],"aioseo_notices":[],"amp_enabled":true,"views":"626","promo_type":"1","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/8857","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=8857"}],"version-history":[{"count":2,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/8857\/revisions"}],"predecessor-version":[{"id":8861,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/8857\/revisions\/8861"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/8859"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=8857"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=8857"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=8857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}